“It was challenging enough to get executives that were traveling to get on VPN so they needed a solution that could be pre-configured for them and something they could rely on.”

Mark Roberts

Bruker Corporation is the publicly traded parent company of Bruker Scientific Instruments, a manufacturer of scientific instruments for molecular and materials research, as well as for industrial and applied analysis. Headquartered in Billerica, Massachusetts, Bruker is a global company with over 6,000 employees.

Trapped behind a firewall

Bruker executives and sales team wanted access to enterprise files outside the network, beyond the firewall. Prior to inSync, company information could only be accessed or backed up through a VPN and that posed a challenge to their users on-the-go. The most common scenario? They weren’t always able to connect and would opt to use less secure workarounds to get what they needed.

They were looking for a centralized control solution that allowed their users to work outside the network and didn’t require much, if any, user interaction with it.

An IT-approved solution for working outside the VPN

Everyone backs up out of necessity; sometimes [endpoint backup] doesn’t get the priority that it should.

What Bruker found most compelling with inSync was how unintrusive the overall backup experience was. Users would only be notified via email when a backup was completed or else the IT department would get an email if something went wrong. This way, end users never had to worry about backups and IT maintained complete visibility in case issues ever came up.

Before inSync, users with lost, stolen or damaged laptops only had the option of starting from scratch using blank laptops — or in some lucky cases, their most recent emails. With the inSync restore feature, IT can now get these users up and running again within 24 hours with a newly issued laptop that has all their prior files and settings on it.

Why inSync

“I think every business should be evaluating backup software, especially for endpoint protection. It’s one of those things where you know you’ll eventually lose data, but having it influences how you’ll react when it happens.”

Mark Roberts

Allowed users to work outside the network

Has an Active Directory (AD) integration

Centralized control and visibility into backups and restores across the board